Category: Education

Proposed Server Cluster for Scenario Business

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

“Phase In” Equipment into Business Operations

[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …

Continue reading

Analyze Trends and Technologies

[Abstract] The purpose of this document is to analyze trends and technologies based upon the recommendation I made for a company to utilize a collaboration system in order to improve communications throughout their organization. The recommendation was made based upon a scenario of a company called Kucera Clothiers whose IT strategy was to improve IT …

Continue reading

Business Trends

[Abstract] The purpose of this document is to describe two different business trends and determine if current business trends have a positive or negative affect on the company by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy of …

Continue reading

Strategic Information Management in Corporate Strategy

[Abstract] The purpose of this document is to critically examine the role of information management in corporate strategy by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three …

Continue reading

Strategic Information Management

[Abstract] The purpose of this document is to provide a basic understanding of managing information systems by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three projects under …

Continue reading

Cyber Crime Offenders

[Abstract] The purpose of this document is intended to discuss motives, opportunity, and means of typical cyber offenders. Also included within this document are three different reasons of why some cyber crime offenders are prosecuted, while others are not. This document is intended for anybody looking to gain a basic understanding of why different people …

Continue reading

Justice System and Forensic Investigators

[Abstract] The purpose of this document is to discuss three elements of the United States justice system and how they relate to a forensics investigator. This document is intended for anybody looking to gain a basic understanding or knowledge of how the justice system applies to forensic investigators. [Content] Since the advent of the Internet …

Continue reading

Software Applications Forensic Investigators Use

[Content] In the realm of computer forensics, there are many different software applications and hardware that digital forensic investigators need to use to find evidence against a crime that was committed, protect the evidence so that it maintains its integrity, and then present the evidence that was found. The vast majority of software applications that …

Continue reading

Hashing Algorithms and CRC Uses

[Abstract] The purpose of this document is to provide a basic understanding of how hashing algorithms and cyclic redundancy checks can be used for evidence, authentication, and filtering. This document is intended for anybody looking to gain a basic understanding or knowledge of how forensic investigators find evidence to be used in a court of …

Continue reading

Hostile Code and Forensic Investigators

[Abstract] The purpose of this document is to identify five different examples of hostile codes and how they impact information systems. Also included within this document is an explanation of how forensic investigators should find the sources of hostile code. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Areas Digital Forensic Investigators Find Evidence

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …

Continue reading

Challenges Forensic Investigators Face

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five technology-related challenges that digital forensics investigators are faced with. Also included within this document are solutions to resolve each of the challenges. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Internet Protocol Security (IPsec)

Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …

Continue reading

Pretty Good Privacy

Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …

Continue reading

Digital Signature Properties

Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Public-key Directory

a laptop computer sitting on a stage in front of a building

Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …

Continue reading

Public-key Cryptography

Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Encryption Techniques

[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …

Continue reading

Business Continuity

[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …

Continue reading

Choosing a Location for a Network Operations Center (NOC)

[Abstract] The purpose of this document is to provide a basic understanding of network operation centers by identifying three key factors to consider when choosing a location for a network operation center. Also included within this document are five areas of physical security to consider when constructing a network operation center. [Content] When considering constructing …

Continue reading

Hardening OS X

[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple’s operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] “Every Mac is secure right out of the box,” thanks …

Continue reading

Disposition of Sensitive Information

[Abstract] The purpose of this document is to provide a summary of the article entitled “Disposition Of Sensitive Automated Information” as the author understands this article. Also included within this document is an explanation of how disk encryption can help to protect the information on that disk in the event it was lost or stolen. …

Continue reading

Financial Institutions Handle Privacy

[Abstract] The purpose of this document is to analyze why many financial institutions assess privacy as a compliance issue as opposed to a risk management issue. Included within this document are two different current regulations to help consumers protect their privacy. Also included within this document is an example of the primary causes of network …

Continue reading

Atlanta Burger King Sign

Proof that the Atlanta city school system works! This is an actual picture of a Burger King in Atlanta.

Network Testing Programs

[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …

Continue reading

Routing Protocols

[Abstract] The purpose of this document is to explain different routing protocols by using them within a scenario of being charged to reconfigure a company‚Äôs network. In the past static routes have been used and, for the scenario, I would like to ease the configuration of routing information. I am concerned about processor utilization if …

Continue reading

Networking Protocols and Models

[Abstract] The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s …

Continue reading